Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Takahiro ShinagawaAssociate Professor, Information Technology Center, The University of TokyoEmail verificata su ecc.u-tokyo.ac.jp
- Hirotake AbeUniversity of TsukubaEmail verificata su cs.tsukuba.ac.jp
- Mizuki OkaAssociate Professor of Computer Science, Tsukuba UniversityEmail verificata su cs.tsukuba.ac.jp
- Yoshihiro OyamaAssociate Professor, University of TsukubaEmail verificata su cc.tsukuba.ac.jp
- Koji HasebeUniversity of TsukubaEmail verificata su cs.tsukuba.ac.jp
- Yasushi ShinjoUniversity of TsukubaEmail verificata su cs.tsukuba.ac.jp
- Kenji KonoKeio UniversityEmail verificata su ics.keio.ac.jp
- Kazumasa OmoteUniversity of TsukubaEmail verificata su risk.tsukuba.ac.jp
- Shigeru ChibaThe University of TokyoEmail verificata su acm.org
- Manabu Hirano (平野 学)Professor, National Institute of Technology, Toyota CollegeEmail verificata su toyota-ct.ac.jp
- Atsushi OhoriTohoku UniversityEmail verificata su riec.tohoku.ac.jp
- Takaaki FukaiEmail verificata su riken.jp
- Kunihiko ToumuraHitachi, Ltd.Email verificata su hitachi.com
- Yosuke CHUBACHIInstitute of Information Security, Active Defense Institute, Ltd.Email verificata su iisec.ac.jp
- takashi ikegamiThe graduate school of Arts and Sciences, University of TokyoEmail verificata su sacral.c.u-tokyo.ac.jp
Segui
Kazuhiko Kato
Professor, Departmen of Computer Science, University of Tsukuba
Email verificata su cs.tsukuba.ac.jp - Home page